ISO/IEC 13335-1:2004
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
03-20-2019
English
11-19-2004
ISO/IEC 13335-1:2004 presents the concepts and models fundamental to a basic understanding of ICT security, and addresses the general management issues that are essential to the successful planning, implementation and operation of ICT security. Part 2 of ISO/IEC 13335 (currently 2nd WD) provides operational guidance on ICT security. Together these parts can be used to help identify and manage all aspects of ICT security.
DevelopmentNote |
Supersedes ISO/IEC TR 13335-1 and ISO/IEC TR 13335-2 (11/2004)
|
DocumentType |
Standard
|
Pages |
28
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
Supersedes |
Standards | Relationship |
BIS IS/ISO/IEC 13335-1 : 2004 | Identical |
GOST R ISO/IEC 13335-1 : 2006 ERRATA 2007 | Identical |
INCITS/ISO/IEC 13335-1 : 2004 | Identical |
BS ISO/IEC 13335-1:2004 | Identical |
CSA ISO/IEC 13335-1 : 2005 | Identical |
DIN ISO/IEC 13335-1:2006-11 | Identical |
INCITS/ISO/IEC 18043 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS |
05/30068972 DC : DRAFT JUN 2005 | ISO/IEC FCD 18043 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS (IDS) |
05/30040757 DC : DRAFT JUN 2005 | ISO/IEC 18028 - INFORMATION TECHNOLOGY - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
PD ISO/TR 12859:2009 | Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
BS ISO/IEC 25012:2008 | Software engineering. Software product quality requirements and evaluation (SQuaRE). Data quality model |
PD ISO/IEC TS 24748-1:2016 | Systems and software engineering. Life cycle management Guidelines for life cycle management |
08/30166961 DC : DRAFT OCT 2008 | BS ISO 24100 - PRIVACY - THE BASIC PRINCIPLES FOR PROBE PERSONAL DATA PROTECTION |
DD IEC/PAS 62443-3:2008 | Security for industrial process measurement and control Network and system security |
BS ISO/IEC TR 13335-4:2000 | Information technology. Guidelines for the management of IT security Selection of safeguards |
BS ISO/IEC 17799 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO/IEC 18043:2006 | Information technology. Security techniques. Selection, deployment and operations of intrusion detection systems |
UNI ISO/IEC 25012 : 2014 | SOFTWARE ENGINEERING - SOFTWARE PRODUCT QUALITY REQUIREMENTS AND EVALUATION (SQUARE) - DATA QUALITY MODEL |
S.R. CEN/TR 16742:2014 | INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
I.S. EN 62628:2012 | GUIDANCE ON SOFTWARE ASPECTS OF DEPENDABILITY (IEC 62628:2012 (EQV)) |
S.R. CWA 16026:2009 | STANDARDISATION OF ONLINE DISPUTE RESOLUTION TOOLS |
I.S. EN ISO 27799:2016 | HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
TR 102 780 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
ISO/TS 17187:2013 | Intelligent transport systems Electronic information exchange to facilitate the movement of freight and its intermodal transfer Governance rules to sustain electronic information exchange methods |
CEI EN 62628 : 2013 | GUIDANCE ON SOFTWARE ASPECTS OF DEPENDABILITY |
BS ISO/IEC 18028-5:2006 | Information technology. Security techniques. IT network security Securing communications across networks using virtual private networks |
BS ISO/IEC 25010:2011 | Systems and software engineering. Systems and software quality requirements and evaluation (SQuaRE). System and software quality models |
INCITS/ISO/IEC 15944-5 : 2008(R2013) | INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 5: IDENTIFICATION AND REFERENCING OF REQUIREMENTS OF JURISDICTIONAL DOMAINS AS SOURCES OF EXTERNAL CONSTRAINTS |
UNE-EN 62628:2015 | Guidance on software aspects of dependability |
PD ISO/TR 11633-2:2009 | Health informatics. Information security management for remote maintenance of medical devices and medical information systems Implementation of an information security management system (ISMS) |
INCITS/ISO/IEC 17799 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO 17090-1:2013 | Health informatics. Public key infrastructure Overview of digital certificate services |
CAN/CSA-ISO/IEC 25010:12 (R2016) | Systems and software engineering - Systems and software quality requirements and evaluation (SQuaRE) - System and software quality models (Adopted ISO/IEC 25010:2011, first edition, 2011-03-01) |
ISO/TR 11633-2:2009 | Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 2: Implementation of an information security management system (ISMS) |
TR 102 538 : 1.1.1 | USER GROUP; LIST OF DEFINITIONS AND ABBREVIATIONS |
UNE 71512:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1» |
INCITS/ISO/IEC 18028-5 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS BETWEEN NETWORKS USING VIRTUAL PRIVATE NETWORKS |
ISO/TR 11633-1:2009 | Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 1: Requirements and risk analysis |
ISO/TR 12859:2009 | Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
ISO/IEC TS 24748-1:2016 | Systems and software engineering Life cycle management Part 1: Guidelines for life cycle management |
UNE 71511:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3» |
UNE 71513:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3» |
BS 7799-1(2005) : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
PD ISO/IEC TR 15443-3:2007 | Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
BS ISO/IEC 20741:2017 | Systems and software engineering. Guideline for the evaluation and selection of software engineering tools |
PD ISO/IEC TR 24748-1:2010 | Systems and software engineering. Life cycle management Guide for life cycle management |
BS ISO/IEC 18028-1:2006 | Information technology. Security techniques. IT network security Network security management |
PD CEN/TR 16742:2014 | Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
04/30126470 DC : DRAFT DEC 2004 | ISO/IEC 24743 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS REQUIREMENTS SPECIFICATION |
12/30186137 DC : 0 | BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
TS 102 165-2 : 4.2.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
BS ISO 17090-3:2008 | Health informatics. Public key infrastructure Policy management of certification authority |
CSA ISO/IEC 25010 : 2012 | SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE QUALITY REQUIREMENTS AND EVALUATION (SQUARE) - SYSTEM AND SOFTWARE QUALITY MODELS |
ISO/IEC TR 15443-3:2007 | Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
IEC PAS 62443-3:2008 | Security for industrial process measurement and control - Network and system security |
CSA ISO/IEC 18028-5 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
UNE 71510:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1». |
ISO/IEC 18028-5:2006 | Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks |
BS 7799-2(2005) : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC 25010:2011 | Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — System and software quality models |
11/30251566 DC : 0 | BS EN 62628 - GUIDANCE ON SOFTWARE ASPECTS OF DEPENDABILITY |
PD ISO/TR 11633-1:2009 | Health informatics. Information security management for remote maintenance of medical devices and medical information systems Requirements and risk analysis |
ISO/IEC 18043:2006 | Information technology Security techniques Selection, deployment and operations of intrusion detection systems |
BS ISO/IEC 15944-5:2008 | Information technology. Business operational view Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
BS EN 62628:2012 | Guidance on software aspects of dependability |
DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
ISO 17090-3:2008 | Health informatics Public key infrastructure Part 3: Policy management of certification authority |
INCITS/ISO/IEC 18028-1 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management |
ISO 17090-1:2013 | Health informatics Public key infrastructure Part 1: Overview of digital certificate services |
ISO 19092-1:2006 | Financial services Biometrics Part 1: Security framework |
ISO 24100:2010 | Intelligent transport systems — Basic principles for personal data protection in probe vehicle information services |
ISO/IEC 18028-1:2006 | Information technology Security techniques IT network security Part 1: Network security management |
ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62628:2012 | Guidance on software aspects of dependability |
17/30355188 DC : 0 | BS ISO/IEC 24748-1 - SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
PD ISO/TS 17187:2013 | Intelligent transport systems. Electronic information exchange to facilitate the movement of freight and its intermodal transfer. Governance rules to sustain electronic information exchange methods |
05/30104603 DC : DRAFT JUN 2005 | ISO/IEC FCD 18028-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
08/30193508 DC : DRAFT NOV 2008 | BS EN 61508-1 - FUNCTIONAL SAFETY OF ELECTRICAL/ELECTRONIC/PROGRAMMABLE ELECTRONIC SAFETY-RELATED SYSTEMS - PART 1: GENERAL REQUIREMENTS |
ISO/IEC 15944-5:2008 | Information technology — Business operational view — Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
UNI EN ISO 21091 : 2013 | HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES |
BS ISO 24100:2010 | Intelligent transport systems. Basic principles for personal data protection in probe vehicle information services |
ISO/IEC 25012:2008 | Software engineering — Software product Quality Requirements and Evaluation (SQuaRE) — Data quality model |
INCITS/ISO/IEC TR 18044 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
ISO/IEC 20741:2017 | Systems and software engineering — Guideline for the evaluation and selection of software engineering tools |
IEEE 24748-1-2011 | IEEE Guide--Adoption of ISO/IEC TR 24748-1:2010 Systems and Software Engineering--Life Cycle Management--Part 1: Guide for Life Cycle Management |
CSA ISO/IEC 18028-1 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
CSA ISO/IEC TS 24748-1 : 2018 | SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
ISO/IEC TR 24748-1:2010 | Systems and software engineering Life cycle management Part 1: Guide for life cycle management |
EN 62628:2012 | Guidance on software aspects of dependability |
CEN/TR 16742:2014 | Intelligent transport systems - Privacy aspects in ITS standards and systems in Europe |
INCITS/ISO/IEC 15444-8:2007[R2019] | Information technology - JPEG 2000 image coding system: Secure JPEG 2000<br> |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.